The Information Security program trains specialists with a master’s degree who demonstrate an in-depth knowledge and competencies regarding: solving problems by applying techniques and methods for information protection; correctly choosing analysis criteria for the advantages and disadvantages of methods and procedures applied to solve security problems; identifying and defining concepts, theories, and methods used to perform analyses focused on information protection in systems at the organizational level; applying basic concepts, theories, and methods for developing security systems that operate at the organizational level; choosing criteria and methods for evaluating the quality, performance, and limitations of security systems based on organizational needs, including those required for defining a quality and security management system; selecting appropriate technologies for implementing the necessary security systems in organizational activities; using modern technologies to define security solutions; using technology-based criteria and methods to evaluate compliance with interoperability standards; developing control measures using modern technologies for transmitting, storing, and processing data based on the needs of an organization; identifying and defining concepts and methods focused on the development, implementation, and use of security solutions; explaining concepts and methods used to develop, implement, and use control measures; applying programming languages, modeling and development environments, and methodologies for creating security systems; using criteria and methods to evaluate the security system development process in terms of quality and performance; developing and implementing security software for specific problems in various fields of human activity; identifying and defining hardware, software, and communications components, as well as those necessary to describe a protection infrastructure; explaining the interaction and operation of architectural and security components; applying basic methods for specifying architectural and infrastructure solutions for typical security problems; using criteria and methods to evaluate functional and non-functional characteristics of security system components; implementing architectural solutions and infrastructure based on constraints imposed by security projects.